Sequel – Hack The Box // Walkthrough & Solution // Kali Linux

In the last video, we got a little experience with SQL injections using Kali Linux. We learnt how a web application may use a database of some kind to authenticate users and how it might be abused if not set correctly. In this box, we go a little further logging into mysql and looking at the databases and tables.